{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:52:20Z","timestamp":1740102740430,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819708000"},{"type":"electronic","value":"9789819708017"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-0801-7_22","type":"book-chapter","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T08:03:04Z","timestamp":1709193784000},"page":"381-393","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["ACDP-Floc: An Adaptive Clipping Differential Privacy Federation Learning Method for\u00a0Wireless Indoor Localization"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0350-359X","authenticated-orcid":false,"given":"Xuejun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiaowen","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Fenghe","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Haiyan","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,1]]},"reference":[{"issue":"4","key":"22_CR1","first-page":"2634","volume":"22","author":"X Zhu","year":"2020","unstructured":"Zhu, X., Qu, W., Qiu, T., Zhao, L., Atiquzzaman, M., Wu, D.: Indoor intelligent fingerprint-based localization: principles. Approaches Challenges 22(4), 2634\u20132657 (2020)","journal-title":"Approaches Challenges"},{"key":"22_CR2","doi-asserted-by":"publisher","unstructured":"Yan, D., Song, W., Wang, X., Hu, Z.: Domestic indoor positioning technology development status review. J. Navigation Positioning 7(04), 5\u201312 (2019). https:\/\/doi.org\/10.16547\/j.cnki.10-1096.20190402","DOI":"10.16547\/j.cnki.10-1096.20190402"},{"key":"22_CR3","doi-asserted-by":"publisher","unstructured":"Nagia, N., Rahman, M.T., Valaee, S.: Federated learning for wifi fingerprinting. In: ICC 2022 - IEEE International Conference on Communications, pp. 4968\u20134973 (2022). https:\/\/doi.org\/10.1109\/ICC45855.2022.9838945","DOI":"10.1109\/ICC45855.2022.9838945"},{"issue":"5","key":"22_CR4","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MNET.001.2200212","volume":"36","author":"X Cheng","year":"2022","unstructured":"Cheng, X., Liu, T., Shu, F., Ma, C., Li, J., Wang, J.: Providing location information at edge networks: a federated learning-based approach. IEEE Netw. 36(5), 114\u2013120 (2022). https:\/\/doi.org\/10.1109\/MNET.001.2200212","journal-title":"IEEE Netw."},{"issue":"3","key":"22_CR5","doi-asserted-by":"publisher","first-page":"2615","DOI":"10.1109\/JIOT.2022.3214211","volume":"10","author":"B Gao","year":"2023","unstructured":"Gao, B., Yang, F., Cui, N., Xiong, K., Lu, Y., Wang, Y.: A federated learning framework for fingerprinting-based indoor localization in multibuilding and multifloor environments. IEEE Internet Things J. 10(3), 2615\u20132629 (2023). https:\/\/doi.org\/10.1109\/JIOT.2022.3214211","journal-title":"IEEE Internet Things J."},{"key":"22_CR6","unstructured":"Liu, Y., et al.: ML-Doctor: holistic risk assessment of inference attacks against machine learning models. In: 31st USENIX Security Symposium (USENIX Security 2022), pp. 4525\u20134542. USENIX Association, Boston, MA (2022)"},{"issue":"9","key":"22_CR7","doi-asserted-by":"publisher","first-page":"2877","DOI":"10.1109\/TMC.2020.2990871","volume":"20","author":"R Nieminen","year":"2021","unstructured":"Nieminen, R., J\u00e4rvinen, K.: Practical privacy-preserving indoor localization based on secure two-party computation. IEEE Trans. Mob. Comput. 20(9), 2877\u20132890 (2021). https:\/\/doi.org\/10.1109\/TMC.2020.2990871","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"23","key":"22_CR8","doi-asserted-by":"publisher","first-page":"24079","DOI":"10.1109\/JIOT.2022.3189361","volume":"9","author":"X Shen","year":"2022","unstructured":"Shen, X., Liu, Y., Zhang, Z.: Performance-enhanced federated learning with differential privacy for internet of things. IEEE Internet Things J. 9(23), 24079\u201324094 (2022). https:\/\/doi.org\/10.1109\/JIOT.2022.3189361","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"22_CR9","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1109\/TII.2021.3131175","volume":"19","author":"B Jiang","year":"2023","unstructured":"Jiang, B., Li, J., Wang, H., Song, H.: Privacy-preserving federated learning for industrial edge computing via hybrid differential privacy and adaptive compression. IEEE Trans. Industr. Inf. 19(2), 1136\u20131144 (2023). https:\/\/doi.org\/10.1109\/TII.2021.3131175","journal-title":"IEEE Trans. Industr. Inf."},{"key":"22_CR10","unstructured":"Koskela, A., Honkela, A.: Learning rate adaptation for differentially private learning. In: Proceedings of the Twenty Third International Conference on Artificial Intelligence and Statistics, vol. 108, pp. 2465\u20132475. PMLR (2020)"},{"key":"22_CR11","doi-asserted-by":"publisher","unstructured":"Xu, Z., Shi, S., Liu, A.X., Zhao, J., Chen, L.: An adaptive and fast convergent approach to differentially private deep learning. In: 2020 IEEE Conference on Computer Communications, pp. 1867\u20131876 (2020). https:\/\/doi.org\/10.1109\/INFOCOM41043.2020.9155359","DOI":"10.1109\/INFOCOM41043.2020.9155359"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"20150","DOI":"10.1109\/ACCESS.2023.3249575","volume":"11","author":"C Ma","year":"2023","unstructured":"Ma, C., Kong, X., Huang, B.: Image classification based on layered gradient clipping under differential privacy. IEEE Access 11, 20150\u201320158 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3249575","journal-title":"IEEE Access"},{"issue":"12","key":"22_CR13","first-page":"2667","volume":"59","author":"Z Xuejun","year":"2022","unstructured":"Xuejun, Z., Fucun, H., Jiyang, G., Junda, B., Haiyan, H., Xiaogang, D.: A differentially private federated learning model for fingerprinting indoor localization in edge computing. J. Comput. Res. Dev. 59(12), 2667\u20132688 (2022)","journal-title":"J. Comput. Res. Dev."},{"key":"22_CR14","doi-asserted-by":"crossref","unstructured":"Yang, Z., J\u00e4rvinen, K.: The death and rebirth of privacy-preserving wifi fingerprint localization with paillier encryption. In: IEEE INFOCOM 2018 - IEEE Conference on Computer Communications, pp. 1223\u20131231 (2018)","DOI":"10.1109\/INFOCOM.2018.8486221"},{"key":"22_CR15","doi-asserted-by":"publisher","unstructured":"Yang, X., Luo, Y., Xu, M., fu, S., Chen, Y.: Privacy-preserving wifi fingerprint localization based on spatial linear correlation. In: Wireless Algorithms, Systems, and Applications: 17th International Conference, WASA 2022, Dalian, China, 24\u201326 November 2022, Proceedings, Part I, pp. 401\u2013412 (2022). https:\/\/doi.org\/10.1007\/978-3-031-19208-1_33","DOI":"10.1007\/978-3-031-19208-1_33"},{"key":"22_CR16","doi-asserted-by":"publisher","unstructured":"Abadi, M., Chu, A., Goodfellow, I., McMahan, H.B., Mironov, I., Talwar, K.: Deep learning with differential privacy. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, CCS 2016, pp. 308\u2013318. Association for Computing Machinery, New York (2016). https:\/\/doi.org\/10.1145\/2976749.2978318","DOI":"10.1145\/2976749.2978318"},{"issue":"6","key":"22_CR17","doi-asserted-by":"publisher","first-page":"4111","DOI":"10.1007\/s00521-021-06815-9","volume":"34","author":"X Zhang","year":"2022","unstructured":"Zhang, X., et al.: A differentially private indoor localization scheme with fusion of wifi and bluetooth fingerprints in edge computing. Neural Comput. Appl. 34(6), 4111\u20134132 (2022). https:\/\/doi.org\/10.1007\/s00521-021-06815-9","journal-title":"Neural Comput. Appl."}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-0801-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T08:13:51Z","timestamp":1709194431000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-0801-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819708000","9789819708017"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-0801-7_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/tjutanklab.com\/ica3pp2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Online submission system","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"439","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"145","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}